博碩士論文 106423008 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:37 、訪客IP:13.59.67.183
姓名 葉香君(Xiang-Jun Ye)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 「我在這裡」—隱私顧慮與自戀人格對使用社群媒體定位功能意圖之影響研究
(“I am here.” — The Effects of Privacy Concern and Narcissism on the Intention to Disclose Location in Social Media)
相關論文
★ 製藥業的成本會計評估研究─ 一個ABC成本制度的應用★ 一個保險業的資料採擷應用--業務員的薪酬制度分析
★ 農漁產品電子化交易中分類分級管理之研究★ 應用類神經網路建構壽險核保決策支援之研究
★ 企業導入ERP之關鍵成功因素-個案研究★ 體外診斷醫療器材滿足CE及GMP驗證要求之個案研
★ 企業資訊系統委外研究-以個案銀行為例★ DRAM月平均價格變動分析
★ 定期航運產業運價及運送時間對經營績效影響之研究-以某外商海運公司在台灣經營為例★ 以交通儲值卡作為電子支付工具的營運模式及可行性分析
★ 軟體公司能力成熟度評估★ 加速台灣海關的通關便捷化-提升行動化服務的解決方案
★ 以均勻度係數為預測晶圓良率指標之可行性分析-以國內某DRAM廠為例★ 某公司資訊部門變革失敗之探討
★ 資訊部門導入ITIL 管理機制之現況分析─ 以企業導入ITIL 服務支援為例★ 導入WCO SAFE 優質企業之可行性分析–以A航空公司為例
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 隨著資訊科技與社群媒體的進步,如:去中心化的5G、區塊鏈等技術,正不斷地改變民眾的生活習慣,目的是在創造更加便利與即時的資訊世界。而智能手機在此便扮演了協助者的角色,民眾可以更輕鬆地藉由手機媒介悠遊網路世界,如:網路購物、社群網站等。然而近幾年出現眾多的個資外洩案,讓民眾開始意識到我們不僅在網路上享受便利的服務,同時也留下許多的「資訊足跡」,而這些足跡很有可能受到非法的收集與濫用,故民眾的隱私顧慮慢慢地提升了。
本研究以計畫行為理論為基礎,並試圖從用戶的角度,去探討現今用戶在社群媒體上選擇揭露自我資訊的影響因素,以使用任何能讓他人得知或追蹤個人位置的定位功能為情境,如:Facebook打卡、Instagram地點標注等。研究結果指出「感知價值」與「行為規範」確實對「使用意圖」有直接正向影響;「隱私顧慮」則對「使用意圖」有負向影響;而「自戀人格」對「隱私顧慮」與「使用意圖」有調節作用。由以上結果發現,社群媒體用戶所感知到的娛樂與社交價值,以及重要關係人的認同與否與實際行為的影響越高,確實會讓用戶越想去使用定位功能。且當用戶越擔心個人隱私會受到非法使用時,用戶就越不願意去使用定位功能。然而,受到自戀人格的調節,有較高程度自戀人格的用戶會有較高的使用意圖。最後,本研究建議企業可以積極地對低自戀程度的使用者做隱私安全措施,以提高他們的使用意願。
摘要(英) With the advance of Information technology and Social media, technologies such as decentralized 5G, block-chain, among others, have been constantly changing our lifestyles, creating a more convenient and instant information world. Smartphones play an important role of helping people to easily surf online, achieving tasks like online shopping, online socializing and so on. However, there are recently many cases of personal private information intrusions. People started to realize that while they are taking advantage of the convenience brought by technologies, there are many privacy risk at the same time. The exposed information may be illegally exploited by hackers.
Based on the Theory of Planned Behavior, this study attempts to look into the factors affecting usage of location-based services in social media, such us check-in in Facebook or tag location in Instagram. Results show that “perceived value” and “behavior norm” have positive effects on “user intention.” Also, “Privacy concern” negatively affects “user intention.” In the meantime, “narcissism” moderates the effect of “privacy concern” on “user intention.” This result shows that the higher the perceived hedonic and utilitarian values, and the greater impact of friends and family’s thought and actual behavior, users are more likely to use location-based services in social media. Also, users are less likely to use it, when they have more concern about their privacy being illegally used. However, the moderating effect of narcissism is such that user with higher level of narcissism are having higher intention to use it. Finally, this study suggests that enterprises should focus on reducing users’ privacy concern, who have low level of narcissism, by building some privacy policy, in order to raise their intention of using location-based services in social media.
關鍵字(中) ★ 計畫行為理論
★ 自戀人格
★ 隱私顧慮
★ 社群媒體
關鍵字(英) ★ Theory of Planned Behavior
★ Narcissism
★ Privacy concern
★ Social media
論文目次 摘要 I
Abstract II
致謝 III
圖目錄 VI
表目錄 VII
第一章 緒論 1
1-1 研究背景 1
1-2 研究動機 2
1-3 研究目的 2
1-4 研究流程 3
第二章 文獻探討 4
2-1 自我揭露 4
2-2 計畫行為理論 6
2-3 感知價值 8
2-4 行為規範 10
2-5 隱私顧慮 10
2-6 社群媒體定位功能 11
2-7 自戀人格 12
2-8 自戀與社群媒體的關係 13
第三章 研究方法 15
3-1 研究架構 15
3-2 研究假說 16
3-2-1 「感知價值」對「定位功能之使用意圖」之影響 16
3-2-2 「行為規範」對「定位功能之使用意圖」之影響 16
3-2-3 「隱私顧慮」對「定位功能之使用意圖」之影響 16
3-2-4 「自戀人格」對「定位功能之使用意圖」之影響 17
3-2-5 「自戀人格」對「感知價值」與「定位功能之使用意圖」之調節影響 17
3-2-6 「自戀人格」對「隱私顧慮」與「定位功能之使用意圖」之調節影響 18
3-3 變數的操作型定義 19
3-3-1 感知價值 19
3-3-2 行為規範 20
3-3-3 隱私顧慮 20
3-3-4 自戀人格 21
3-3-5 定位功能之使用意圖 22
3-4 研究設計 22
3-4-1 問卷設計 22
3-4-2 研究樣本與資料收集方法 22
3-4-3 資料分析方法與工具 24
第四章 資料分析 25
4-1 問卷回收過程 25
4-2 敘述性統計分析 26
4-3 問卷量表之信、效度檢驗 28
4-3-1 收斂效度 28
4-3-2 區別效度 30
4-3-3 信度分析 30
4-4 研究假說的實質關係檢定 31
4-4-1 模型適配度 31
4-4-2 研究假說驗證結果 32
4-4-3 主效果 34
4-4-4 調節效果 35
4-4-5 小結 37
第五章 結論與建議 39
5-1 研究結果 39
5-1-1 「感知價值」對「定位功能之使用意圖」 40
5-1-2 「行為規範」對「定位功能之使用意圖」 40
5-1-3 「隱私顧慮」對「定位功能之使用意圖」 40
5-1-4 「自戀人格」對「隱私顧慮」與「定位功能之使用意圖」的調節效果 40
5-2 研究貢獻 41
5-3 管理意涵 41
5-4 研究限制 42
5-5 未來研究方向 42
參考文獻 44
附錄一 問卷設計 50
參考文獻 英文文獻
1. Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. In: J. Kuhl & J. Beckman (Eds.), Action Control: From cognition to behavior (pp 11-39). Heidelberg: Springer.
2. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.
3. Ajzen, I. (2002). Constructing a TPB questionnaire: Conceptual and methodological considerations. 2019年3月13日,取自https://pdfs.semanticscholar.org/0574/b20bd58130dd5a961f1a2db10fd1fcbae95d.pdf?_ga=2.247588228.2047516183.1558772406-1737810901.1558772406
4. Ajzen, I. (2006). Constructing a Theory of Planned Behavior Questionnaire: Brief description of the theory of planned behavior. 2019年3月13日,取自https://people.umass.edu/aizen/pdf/tpb.measurement.pdf
5. Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ: Prentice-Hall.
6. Allen, V. (1965). Situational factors in conformity. Advances in Experimental Social Psychology, 2, 133-170.
7. Ames, D. R., Rose, P., & Anderson, C. P. (2006). The NPI-16 as a short measure of narcissism. Journal of Research in Personality, 40, 440-450.
8. Andrade, E. B., Kaltcheva, V., & Weitz, B. (2002). Self-Disclosure on the web: the impact of privacy policy, reward and company reputation. Advances in Consumer Research, 29 (1), 350–353.
9. Asch, S.E. (1951). Effects of group pressure on the modification and distortion of judgments. In H. Guetzkow (Ed.), Groups, leadership and men(pp. 177–190). Pittsburgh, PA:Carnegie Press.
10. Babin B.J., Darden W.R., & Griffin M. (1994). Work and/or fun: measuring hedonic and utilitarian shopping value. Journal of consumer research, Vol. 20, No. 4 (Mar., 1994), pp. 644-656.
11. Bandura A. (1982). Self-Efficacy Mechanism in Human Agency. American psychologist, Vol. 37, No. 2, 122-147.
12. Bandura A. (1997). Self-efficacy: The exercise of control. Macmillan.
13. Banerjee, A. V. (1992). A Simple Model of Herd Behavior. The Quarterly Journal of Economics, Volume 107, Issue 3, August 1992, Pages 797–817.
14. Bentler, P. M. (1990). Comparative fit indexes in structural models. Psychological Bulletin, 107 (2), 238 246.
15. Bibby, P. A. (2008). Dispositional Factors in the Use of Social Networking Sites: Findings and Implications for Social Computing Research. International Conference on Intelligence and Security Informatics, 5075, pp. 392–400.
16. Błachnio, A., Przepiorka, A., Bałakier, E., & Boruch, W. (2016). Computers in Human Behavior, 55, 664–667.
17. Browne, M. W., & Cudeck, R. (1993). Alternative ways of assessing model fit. In K.A. Bollen and J.S. Long (Eds.), Testing structural equation models. Newbury Park, CA: Sage.
18. Campbell, W. K., & Foster, J. D. (2007). The narcissistic self: Background, an extended agency model and ongoing controversies. In C. Sedikides & S. J. Spencer (Eds.), The self (pp. 115-138). New York, NY: Psychology Press.
19. Cho, I., Kim, J. K., Park, H., & Lee, S. M. (2014). Motivations of Facebook Places and store atmosphere as moderator. Industrial Management & Data Systems, Vol. 114 No. 9, pp. 1360-1377.
20. Derlega, V. J., Metts, S., Sandra, P., & Margulis, S. T. (1993). Self-Disclosure. California: Sage Publications, Inc.
21. Dinev, T., & Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research, Vol. 17, No. 1, pp. 61-80.
22. Ducoffe, R. H. (1996). Advertising value and advertising on the Web. Journal of Advertising Research, 36(5), 21-35.
23. Eling, N., Krasnova, H., Widjaja, T., & Buxmann, P. (2013). Will you accept an app? Empirical investigation of the decisional calculus behind the adoption of applications on Facebook. In Proceedings of the 34th International Conference on Information Systems, Milan, Italy.
24. Emmons, R. A. (1984). Factor analysis and construct validity of the Narcissistic Personality Inventory. Journal of Personality Assessment, 4S, 291-300.
25. Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Addison-Wesley, Reading, MA.
26. Fomell, C. (1983). Issues in the application of covariance structure analysis: A comment. Journal of Consumer Research, 9, 443-448
27. Fornell, C. R., & Larcker, F. F. (1981). Structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 39 51.
28. Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate data analysis (5th ed.). New York: Macmillan.
29. Henry, J. W., & Stone, R. W. (1994). A structural equation model of end user satisfaction with a computer based medical information system. Information Resources Management Journal, 7(3), 21 33.
30. Hsu, CL., & Lin, CC. (2015). What drives purchase intention for paid mobile apps? – An expectation confirmation model with perceived value. Electronic Commerce Research and Applications, Volume 14, Issue 1, Pages 46-57
31. Insu, C., Joseph, K. K., Heejun, P., & Sang, M. L., (2014). Motivations of Facebook Places and store atmosphere as moderator. Industrial Management and Data Systems, Vol. 114 Issue: 9, pp.1360-1377.
32. Joinson, A. N. (2001). Self‐disclosure in computer‐mediated communication: The role of self‐awareness and visual anonymity. European Journal of Social Psychology, 31(2), 177-192.
33. Jourard, S. M. (1959). Healthy personality and self-disclosure. Mental Hygiene, New York.
34. Junglas, I. A., Johnson, N. A., & Spitzmuller, C. (2008). Personality traits and concern for privacy: an empirical study in the context of location-based services. European Journal of Information Systems, 17 (4), 387–402.
35. Kapidzic, S. (2013). Narcissism as a predictor of motivations behind Facebook profile picture selection. Cyberpsychology, Behavior, and Social Networking, 16, 14e19. http://dx.doi.org/10.1089/cyber.2012.0143.
36. Kim H.S. (2016). What drives you to check in on Facebook? Motivations, privacy concerns, and mobile phone involvement for location-based information sharing. Computers in Human Behavior, Volume 54, January 2016, Pages 397-406.
37. Li, H., Sarathy, R., & Wu, H. (2011). The role of affect and cognition on online consumers’ decision to disclosure personal information to unfamiliar online vendors. Decision Support Systems, 51, 434-445.
38. Luarna, P., & Lin, H. (2005). Toward an understanding of thebehavioral intention to use mobile banking. Computers in Human Behavior, 21 873–891.
39. McIver, J. P., & Carmines, E. G. (1981). Unidimensional scaling. California: sage publication.
40. Mehdizadeh, S. (2010). Self-presentation 2.0: Narcissism and self-esteem on Facebook. Cyberpsychology, Behavior and Social Networking, 13(4), 357-364.
41. Morf, C. C., & Rhodewalt, F. (2001). Unraveling the Paradoxes of Narcissism: A Dynamic Self-Regulatory Processing Model. Psychological Inquiry, Vol. 12, No. 4, pp. 177-196.
42. Nunnally, J. C. (1967). Psychometric theory. New York: McGraw-Hill.
43. Omarzu, J. (2000). A Disclosure Decision Model: Determining How and When Individuals Will Self-Disclose. Personality and Social Psychology Review, Volume: 4 issue: 2, page(s): 174-185.
44. Raacke J., Bonds-Raacke J. (2008). MySpace and Facebook: Applying the Uses and Gratifications Theory to Exploring Friend-Networking Sites. CyberPsychology & Behavior, Vol. 11, No. 2
45. Raskin, R., & Hall, C. S. (1981). The Narcissistic Personality Inventory: Alternate form reliability and further evidence of construct validity. Journal of Personality Assessment, 45,159-162.
46. Raskin, R., & Terry, H. (1988). A Principal-Components Analysis of the Narcissistic Personality Inventory and Further Evidence of Its Construct Validity. Journal of Personality and Social Psychology, Vol. 54, No. 5,890-902.
47. Rheingold, H. (1993). The virtual community: Homesteading on the electronic frontier. Reading, MA: Addison-Wesley.
48. Rivis, A., & Sheeran, P. (2003). Descriptive norms as an additional predictor in the theory of planned behaviour: A meta-analysis. Current Psychology, 22(3), 218-233. DOI:10.1007/s12144-003-1018-2
49. Ryan, T., & Xenos, S. (2011). Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness and Facebook usage. Computers in Human Behavior, 27(5), 1658–1664.
50. Schumacker, R. E., & Lomax, R. G. (2004). A beginner’s guide to structural equation modeling (2nd ed.). Mahwah, NJ: Lawrence Erlbaum Associates.
51. Statista. (2019). Active social network penetration in selected countries as of January 2019. 2019年3月13日,取自https://www.statista.com/statistics/282846/regular-social-networking-usage-penetration-worldwide-by-country/
52. Steiger, J. H., & Lind, J. M. (1980). Statistically based tests for the number of factors. Psychometric Society, Iowa City, IA.
53. Taylor, D. A., Wheeler, L., & Altman, I. (1973). Self-disclosure in isolated groups. Journal of Personality and Social Psychology, 26(1), 39-47.
54. To, P. L., Liao, C., & Lin T. H. (2007). Shopping motivations on Internet: A study based on utilitarian and hedonic value. Technovation, Volume 27, Issue 12, pp. 774-787.
55. Wu, H. L. (2009). Utilitarian and Hedonic Values of Social Network Services. Proceedings of the Fifteenth Americas Conference on Information Systems, Paper 289, San Francisco, CA, USA.
56. Zeithaml, V. A. (1988). Consumer perceptions of price, quality, and value: a means-end model and synthesis of evidence. The Journal of Marketing, 52, 2-22.
57. Zeng, S. Y., Wu, L. L., & Chen, H. G. (2009). Sharing private information online: The mediator effect of social exchange. Paper presented at the Proceedings of the 11th International Conference on Electronic Commerce, Taipei, Taiwan.
中文文獻
1. 吳肇銘。(1999)。影響網站使用意向之因素研究─以入門網站為例。國立中央大學資訊管理研究所博士論文,桃園市。
2. 林建宏。(2014)。什麼樣的人離不開 Facebook – 自戀人格的調節效果。國立中央大學資訊管理研究所碩士論文,桃園市。
3. 曹亞璇。(2018)。為什麼願意在遊戲內知識分享?—探討MMORPG玩家遊戲內知識分享之意圖。國立中央大學資訊管理研究所碩士論文,桃園市。
4. 郭俊賦。(2015)。網路使用者的隱私顧慮與誘因對於 其自我揭露行為之影響。國立中央大學資訊管理研究所碩士論文,桃園市。
5. 陳曉莉 (2018)。中國最大資料外洩事件!? 傳駭客在黑市兜售華住酒店集團1.3億名客戶資訊。2019年3月13日,取自https://www.ithome.com.tw/news/125567
6. 陳曉莉 (2019)。資安研究:5個Collection #系列資料庫,總計彙整了22億組外洩的電子郵件與密碼。2019年3月13日,取自https://www.ithome.com.tw/news/128594
7. 創市際。(2018)。社群服務篇與社交媒體類別使用概況。創市際雙周刊,第一一七期。
8. 經濟日報 (2018)。萬豪酒店遭駭,5億個資外洩。2019年3月13日,取自https://money.udn.com/money/story/5599/3511894
指導教授 范錚強 審核日期 2019-6-20
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明